Unsolicited bulk e-mail is referred to as __________.
A. spam
B. propagating
C. phishing
D. crimeware
A. spam
Computer Science & Information Technology
You might also like to view...
In a business letter, the signature block consists of two to four lines below the complimentary closing, and is followed by the sender's typed name
Indicate whether the statement is true or false
Computer Science & Information Technology
When you create a chart in Word, a(n) ________ is displayed
Fill in the blank(s) with correct word
Computer Science & Information Technology